Work Package Deliverable

- WP1: Human and HCI Modelling
  • Summary report pdf
- WP2: Attacks modelling and software development
  • Summary report pdf
- WP3: Manual analysis on human behaviour related attacks
  • Task 3.1 and Task 3.2 (relatd paper is under submission)
  • Task 3.3 (related paper is under submission)
  • Task 3.4 book link
  • Summary report pdf
- WP4: Automated analysis of human behaviour related attacks
  • Task 4.1 technical report pdf
  • Task 4.2 open source software CogTool+ is hosting at CogTool+ (will be public avaiable soon...)
  • Task 4.3 automated analysis of human behaviour enhanced emanation based attacks pdf
  • Task 4.4 user manual and use cases pdf with code example source files
  • Summary report pdf
- WP5
  • Task 5.1 Sumary report pdf
  • Task 5.2 Sumary report pdf
  • Outcomes:
    --Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model pdf
    --Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles pdf

Published Work

  • Haiyue Yuan, Shujun Li, Patrice Rusconi, "CogTool+: Modeling human performance at large scale," accepted to ACM Transactions on Computer-Human Interaction, ACM.
  • Haiyue Yuan, Shujun Li, Patrice Rusconi, Cognitive Modeling for Automated Human Performance Evaluation at Scale DOI , part of Human–Computer Interaction Series book series (HCIS) and of SpringerBriefs in Human-Computer Interaction book sub series (BRIEFSHUMAN), ISBN 978-3-030-45704-4, 2020 © Springer
  • Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar, Francesca Trevisan, Haiyue Yuan, "Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes", ACM Trans. Priv. Secur. 24, 1, Article 1 (January 2021), 33 pages. pdf
  • Ximing Liu, Yingjiu Li, Robert H. Deng, Shujun Li and Bing Chang, "When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks," Computers & Security in September 2018, Elsevier pdf, DOI
  • Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, and Robert H.Deng, 'Making a good thing better: enhancing password/PIN-based user authentication with smartwatch', In Cybersecurity (2018) 1:7 pdf, DOI
  • Haiyue Yuan, Shujun Li, Patrice Rusconi, and Nouf Aljffan, 'When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems', In HCI International 2017, Vancouver, Canada.(Won best paper award) pdf, DOI
  • Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan and Mohamed Ali Kaafar. 'BehavioCog: An Observation Resistant Authentication Scheme', In International Conference of Financial Cryptography and Data Security 2017. pdf DOI
  • N. Williams and S. Li, "Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, 2017, pp. 1-8. pdf, DOI
  • C. Sandy, P. Rusconi and S. Li, "Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, 2017, pp. 1-8.pdf DOI